Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
From MaRDI portal
Publication:6636397
DOI10.1007/978-3-031-58716-0_12MaRDI QIDQ6636397
Qianqian Yang, Jian Weng, Ling Song, Lei Hu, Yincen Chen
Publication date: 12 November 2024
differential attackkey recovery attack\texttt{SKINNY}rectangle attack\texttt{Deoxys-BC}\texttt{ForkSkinny}\texttt{CRAFT}
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Differential cryptanalysis of DES-like cryptosystems
- Boomerang Connectivity Table: a new cryptanalysis tool
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Improved Differential Cryptanalysis of Round-Reduced Speck
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The Return of the Cryptographic Boomerang
- Truncated boomerang attacks and application to AES-based ciphers
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Differential meet-in-the-middle cryptanalysis
This page was built for publication: Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6636397)